Home > Research > Publications & Outputs > Security engineering with patterns

Electronic data

View graph of relations

Security engineering with patterns

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Security engineering with patterns. / Schumacher, Markus; Roedig, Utz.
Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001). 2001.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Schumacher, M & Roedig, U 2001, Security engineering with patterns. in Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

APA

Schumacher, M., & Roedig, U. (2001). Security engineering with patterns. In Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001)

Vancouver

Schumacher M, Roedig U. Security engineering with patterns. In Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001). 2001

Author

Schumacher, Markus ; Roedig, Utz. / Security engineering with patterns. Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001). 2001.

Bibtex

@inproceedings{3d1aee1f2f1743138f4b076a35ba7fa2,
title = "Security engineering with patterns",
abstract = "Conducting digital business requires secure network and application architectures. The recently increasing occurrence of severe attacks has shown, however, that we will still need quite some time and effort to reach security standards of IT systems alike the standard already usual in other fields. At present, there is a huge gap between theory and the code of practice. Whereas scientists work on formal approaches for the specification and verification of security requirements, practitioners have to meet the users requirements. The Pattern Community recognized this problem, too. Patterns literally capture the experience from experts in a structured way. Thus novices can benefit from know-how and skills of experts. Hence, we propose to apply the pattern approach to the security problem. We show that recent security approaches are not sufficient and describe how Security Patterns contribute to the overall process of security engineering. A Security Pattern System provides linkage between Security Patterns. Thus dependencies between specific security problems can be considered in a comprehensive way.",
author = "Markus Schumacher and Utz Roedig",
year = "2001",
month = sep,
day = "1",
language = "English",
booktitle = "Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001)",

}

RIS

TY - GEN

T1 - Security engineering with patterns

AU - Schumacher, Markus

AU - Roedig, Utz

PY - 2001/9/1

Y1 - 2001/9/1

N2 - Conducting digital business requires secure network and application architectures. The recently increasing occurrence of severe attacks has shown, however, that we will still need quite some time and effort to reach security standards of IT systems alike the standard already usual in other fields. At present, there is a huge gap between theory and the code of practice. Whereas scientists work on formal approaches for the specification and verification of security requirements, practitioners have to meet the users requirements. The Pattern Community recognized this problem, too. Patterns literally capture the experience from experts in a structured way. Thus novices can benefit from know-how and skills of experts. Hence, we propose to apply the pattern approach to the security problem. We show that recent security approaches are not sufficient and describe how Security Patterns contribute to the overall process of security engineering. A Security Pattern System provides linkage between Security Patterns. Thus dependencies between specific security problems can be considered in a comprehensive way.

AB - Conducting digital business requires secure network and application architectures. The recently increasing occurrence of severe attacks has shown, however, that we will still need quite some time and effort to reach security standards of IT systems alike the standard already usual in other fields. At present, there is a huge gap between theory and the code of practice. Whereas scientists work on formal approaches for the specification and verification of security requirements, practitioners have to meet the users requirements. The Pattern Community recognized this problem, too. Patterns literally capture the experience from experts in a structured way. Thus novices can benefit from know-how and skills of experts. Hence, we propose to apply the pattern approach to the security problem. We show that recent security approaches are not sufficient and describe how Security Patterns contribute to the overall process of security engineering. A Security Pattern System provides linkage between Security Patterns. Thus dependencies between specific security problems can be considered in a comprehensive way.

M3 - Conference contribution/Paper

BT - Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001)

ER -